Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for authenticating users of an emergency communication network

a communication network and user authentication technology, applied in the field of communication networks, can solve the problems of difficult for emergency personnel to obtain access to the network, difficult for users to correctly remember the long pin required to access the network, and difficult for users to remember their long pin, so as to reduce the authentication requirements of group members

Inactive Publication Date: 2008-01-10
RPX CLEARINGHOUSE
View PDF28 Cites 101 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0013]According to yet another embodiment of the invention, authentication information may come from contemporaneous use of the ECN by other members of a group, so that the authentication requirements of group members may be reduced as other members of the group authenticate with the ECN. In this embodiment, groups of individuals may be partially authenticated on the ECN as a result of the authentication of other members of the group, so that the group members may all use the ECN resources without all individually authenticating on the ECN. As the members of the group authenticate with the system, the collective authentication information received from the members of the group may be used to authenticate the remaining members of the group, so that fewer than all of the group members are required to provide full authentication information to obtain services associated with the emergency communication network. In addition, the ECN may create a voice or multimedia conference for users belonging to a group and authenticated as a group. This may allow new services such as push-to-talk group services, telephone conferences, in-bound dialing, and other services to take place on the ECN, either in the wireless or wired domain.

Problems solved by technology

At the same time, people affected by the disaster may swamp the network with telephone calls thereby making it difficult for the emergency personnel to obtain access to the network.
Emergency situations may be very stressful, which may make it difficult for a user to correctly remember the long PIN required to access the network.
Particularly where the user is not accustomed to remembering the long PIN, the increased stress associated with the emergency situation may make it difficult for the user to remember their long PIN.
Unfortunately, the user may not have access to the card when it is necessary to make an emergency telephone call.
Additionally, there are restrictions on the way in which the long PIN may be stored.
Similarly, even if the phone is pre-programmed with the long PIN the user may not have access to their own phone during the emergency situation.
In addition to problems remembering and dialing a long string of digits under stressful emergency conditions, reading and dialing a long number may take a relatively long time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for authenticating users of an emergency communication network
  • Method and apparatus for authenticating users of an emergency communication network
  • Method and apparatus for authenticating users of an emergency communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020]The following detailed description sets forth numerous specific details to provide a thorough understanding of the invention. However, those skilled in the art will appreciate that the invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, protocols, algorithms, and circuits have not been described in detail so as not to obscure the invention.

[0021]FIG. 1 illustrates the basic GETS architecture. Although an embodiment of the invention will be described in connection with the GETS architecture, the invention is not limited to this particular embodiment as other embodiments of the invention may be used to provide access to other emergency communication networks. For example, the invention may be used with the WPS and other emergency communication networks. The invention may also be used on deployed networks such as the PSTN or wireless networks, or may be deployed in connection with emerging voice and multimedia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication system is configured to weight multiple available network supplied and user supplied authentication factors to determine whether a user should be provided with access to an Emergency Communication Network (ECN). The multiple factors may include the location of the user, MIN, short PIN, token, biometric information, and other information. The level of access to be provided to the user may be tiered based on the authentication level achieved during the weighting process. Authentication information may be shared between groups of individuals, so that the authentication requirements for group members may be reduced as other members of the group supply authentication information to the ECN. Group authentication may be used to enable group services such as conferencing and push-to-talk to be set up automatically for the group.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates to communication networks and, more particularly, to a method and apparatus for authenticating users of an emergency communication network.[0003]2. Description of the Related Art[0004]In a serious disaster, such as a hurricane, flood, earthquake, or terrorist attack, it may be essential for emergency personnel to have access to a telephone network so that the response to the disaster may be coordinated. At the same time, people affected by the disaster may swamp the network with telephone calls thereby making it difficult for the emergency personnel to obtain access to the network. To ensure that emergency personnel are able to receive priority access to available network resources, a separate access system has been developed, which is commonly referred to as the Government Emergency Telecommunications Service (GETS).[0005]The GETS is an emergency communications service designed to be used ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00
CPCG06F21/32G06F21/34H04L63/104G06K9/00885H04L63/08G06F2221/2111G06V40/10
Inventor LEE, MICHAEL
Owner RPX CLEARINGHOUSE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products